{"id":709,"date":"2022-10-05T20:20:36","date_gmt":"2022-10-05T20:20:36","guid":{"rendered":"https:\/\/securitybriefing.net\/?p=709"},"modified":"2022-10-05T20:20:36","modified_gmt":"2022-10-05T20:20:36","slug":"vikten-av-cybersakerhet","status":"publish","type":"post","link":"https:\/\/securitybriefing.net\/sv\/cybersakerhet\/vikten-av-cybersakerhet\/","title":{"rendered":"Vikten av cybers\u00e4kerhet"},"content":{"rendered":"<p>Genom historien har de som varit inblandade i konflikter alltid anv\u00e4nt den mest aktuella tekniken f\u00f6r att fr\u00e4mja sin sak och uppn\u00e5 specifika m\u00e5l. I varje krig har genombrott anv\u00e4nts f\u00f6r att bek\u00e4mpa verkliga eller upplevda fiender genom vetenskapliga framsteg.<\/p>\n\n\n\n<p>Konflikter \u00e4r idag inte l\u00e4ngre begr\u00e4nsade till traditionella slagf\u00e4lt; ist\u00e4llet kan de finnas p\u00e5 internet \u2013 en fiende som \u00e4r b\u00e5de smidig och snabb. Cyberangripare vet att v\u00e5ra samh\u00e4llen \u00e4r beroende av den digitala v\u00e4rlden, och om de kan st\u00f6ra och destabilisera den, kan de s\u00e4kra en betydande seger med ett enda musklick.<\/p>\n\n\n\n<h2><strong>Stuxnet-masken<\/strong><\/h2>\n\n\n\n<p>Enligt experter skadade Stuxnet m\u00e5nga centrifuger vid Irans urananrikningsanl\u00e4ggning i Natanz genom att br\u00e4nna ut dem. Andra organisationer modifierade viruset allt eftersom tiden gick och fokuserade p\u00e5 elgeneratorer, vattenreningsverk och gasledningar.<\/p>\n\n\n\n<p>Stuxnet var ett virus i flera delar som infiltrerade Windows-datorer, spreds via USB-enheter och skadade industriella kontrollsystem. Den skadliga programvaran unders\u00f6kte varje hackad maskin efter tecken p\u00e5 Siemens Step 7-programvara, som industriella maskiner med PLC anv\u00e4nder f\u00f6r att automatisera och hantera elektromekanisk utrustning.<\/p>\n\n\n\n<p>Efter att skadlig programvara uppt\u00e4ckte en PLC-dator, laddade den ner ny kod fr\u00e5n internet och b\u00f6rjade ge skadliga instruktioner till den PC-styrda enheten. Samtidigt skickades falska data till styrsystemet. Om det inte \u00e5tg\u00e4rdas kan detta orsaka allvarliga skador.<\/p>\n\n\n\n<p>Enligt k\u00e4llor inom cyberunderr\u00e4ttelsetj\u00e4nsten laddades Stuxnet 2012 ner till Natanz urananrikningsanl\u00e4ggnings system. Den skadliga \"masken\" infiltrerade n\u00e4tverk och riktade in sig p\u00e5 maskiner som k\u00f6rde Windows-programvara f\u00f6r att automatisera och hantera elektromekanisk utrustning.<\/p>\n\n\n\n<p>N\u00e4r viruset hade slutf\u00f6rt m\u00e4tningarna av uranet b\u00f6rjade det f\u00f6rst\u00f6ra sig sj\u00e4lvt och g\u00f6ra uranet v\u00e4rdel\u00f6st.<\/p>\n\n\n\n<p>Programmets m\u00e5l var att s\u00e4nka kvaliteten p\u00e5 uranet, vilket \u00e4r anledningen till att viruset f\u00f6rst riktade in sig p\u00e5 centrifugalutrustningens hastighet p\u00e5 anl\u00e4ggningen. Den skulle d\u00e5 framst\u00e5 som normal f\u00f6r dem som \u00f6vervakade den, vilket resulterade i ett \"steady state\". Uranets f\u00f6rst\u00f6relse skulle avsl\u00f6jas f\u00f6rst n\u00e4r anl\u00e4ggningens utrustning b\u00f6rjade sj\u00e4lvf\u00f6rst\u00f6ras. Vid den tidpunkten skulle Stuxnet ha fullbordat sitt m\u00e5l.<\/p>\n\n\n\n<p>Men koden f\u00f6r detta virus offentliggjordes. Andra har sedan dess modifierat den f\u00f6r att rikta in sig p\u00e5 andra infrastrukturinstallationer, inklusive vattenreningsverk, gasledningar, kraftverk och kommunikationsn\u00e4t.<\/p>\n\n\n\n<h2><strong>I m\u00f6rkret: Viktiga branscher m\u00f6ter cyberattacker<\/strong><\/h2>\n\n\n\n<p>Enligt uppgift fr\u00e5n <a href=\"https:\/\/www.mcafee.com\/blogs\/enterprise\/in-the-dark-crucial-industries-confront-cyberattacks\/\">McAfee<\/a>2011 tog f\u00f6retag till att anst\u00e4lla f\u00f6re detta hackare eftersom de inte kunde hitta tillr\u00e4ckligt m\u00e5nga personer med r\u00e4tt kompetens f\u00f6r att skydda sina n\u00e4tverk. Center for Strategic &amp; International Studies lyfte fram f\u00f6ljande oroande fakta:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Utpressning \u00e4r det mest utbredda cyberhotet som den globala energibranschen st\u00e5r inf\u00f6r.<\/li>\n<li>Cyberattacker har riktats mot cirka 80% av de mexikanska kraftbolagen.<\/li>\n<li>Mer \u00e4n en fj\u00e4rdedel av v\u00e4rldens energileverant\u00f6rer har utsatts f\u00f6r utpressning.<\/li>\n<li>60% av kraftbolagen i Indien har infiltrerats.<\/li>\n<li>\"Duqu\", en variant av Stuxnet, har hittats i energianl\u00e4ggningar i \u00e5tta l\u00e4nder.<\/li>\n<\/ul>\n\n\n\n<h2><strong>Den digitala v\u00e4rlden \u00e4r ett slagf\u00e4lt<\/strong><\/h2>\n\n\n\n<p>Historiskt sett har angripare attackerat vatten- och livsmedelsk\u00e4llor f\u00f6r att f\u00f6rsvaga sina fiender. Under andra v\u00e4rldskriget f\u00f6rst\u00f6rdes till exempel allm\u00e4nnyttiga f\u00f6retag och industrist\u00e4der f\u00f6r att f\u00f6rsv\u00e5ra de invaderande arm\u00e9ernas krigsanstr\u00e4ngningar. Dessa metoder anv\u00e4nds fortfarande idag eftersom de \u00e4r effektiva; v\u00e5ra motst\u00e5ndare kan befinna sig tusentals kilometer bort bakom datorsk\u00e4rmar, men de kan \u00e4nd\u00e5 utf\u00f6ra angrepp i den verkliga v\u00e4rlden som p\u00e5verkar oss alla.<\/p>\n\n\n\n<p>Vi befinner oss i krig och m\u00e5ste \u00e4ndra v\u00e5rt s\u00e4tt att t\u00e4nka f\u00f6r att anpassa oss till detta nya slagf\u00e4lt. Vem som helst av oss kan vara en m\u00e5ltavla. Om vi ska kunna besegra v\u00e5r fiende m\u00e5ste vi f\u00f6rst f\u00f6rst\u00e5 det nya landskapet och de nya reglerna.<\/p>\n\n\n\n<h2><strong>Cybers\u00e4kerhet \u00e4r viktigare \u00e4n n\u00e5gonsin<\/strong><\/h2>\n\n\n\n<p>Behovet av cybers\u00e4kerhet har aldrig varit st\u00f6rre. I och med internets int\u00e5g har v\u00e5ra liv blivit alltmer beroende av teknik. Vi f\u00f6rlitar oss p\u00e5 datorer f\u00f6r allt fr\u00e5n kommunikation till bank\u00e4renden och underh\u00e5llning. Men det h\u00e4r beroendet har ett pris. I takt med att v\u00e5ra liv flyttar ut p\u00e5 n\u00e4tet blir vi mer s\u00e5rbara f\u00f6r cyberattacker.<\/p>\n\n\n\n<p>Och den h\u00e4r typen av hot blir allt vanligare och allt mer sofistikerade. Hackare n\u00f6jer sig inte l\u00e4ngre med att stj\u00e4la v\u00e5r information; de vill nu st\u00f6ra v\u00e5ra liv och v\u00e5r ekonomi. Under 2017 s\u00e5g vi en stor cyberattack som lamslog Storbritanniens nationella h\u00e4lso- och sjukv\u00e5rd. Ransomware-attacken WannaCry krypterade data och kr\u00e4vde en l\u00f6sensumma f\u00f6r att f\u00e5 tillbaka den. Attacken orsakade omfattande st\u00f6rningar och kostade NHS miljontals pund.<\/p>\n\n\n\n<p>Under 2018 s\u00e5g vi den st\u00f6rsta cyberattacken i historien. NotPetya-viruset infekterade datorer \u00f6ver hela v\u00e4rlden och orsakade skador v\u00e4rda miljarder dollar. Viruset krypterade data och kr\u00e4vde en l\u00f6sensumma, men angriparna kunde inte erbjuda n\u00e5got s\u00e4tt att dekryptera datan. Detta ledde till att m\u00e5nga f\u00f6retag f\u00f6rlorade tillg\u00e5ngen till sina viktiga data.<\/p>\n\n\n\n<p>Dessa attacker visar oss att vi \u00e4r s\u00e5rbara. De visar oss ocks\u00e5 att v\u00e5r nuvarande strategi f\u00f6r cybers\u00e4kerhet inte fungerar. Vi m\u00e5ste g\u00f6ra mer f\u00f6r att skydda oss mot cyberattacker.<\/p>\n\n\n\n<p>Vi kan vidta m\u00e5nga \u00e5tg\u00e4rder f\u00f6r att f\u00f6rb\u00e4ttra v\u00e5r cybers\u00e4kerhet, men vi m\u00e5ste b\u00f6rja med en grundl\u00e4ggande f\u00f6r\u00e4ndring av hur vi t\u00e4nker kring s\u00e4kerhet. Vi m\u00e5ste f\u00f6rst komma bort fr\u00e5n uppfattningen att s\u00e4kerhet \u00e4r n\u00e5got som kan uppn\u00e5s enbart med hj\u00e4lp av teknik. Teknik \u00e4r viktigt, men det \u00e4r inte tillr\u00e4ckligt. Vi m\u00e5ste ocks\u00e5 f\u00f6r\u00e4ndra v\u00e5ra tankes\u00e4tt.<\/p>\n\n\n\n<h2><strong>F\u00f6rst\u00e5 hotbilden<\/strong><\/h2>\n\n\n\n<p>Det f\u00f6rsta steget \u00e4r att f\u00f6rst\u00e5 hotet. Vi m\u00e5ste utbilda oss sj\u00e4lva om hotets natur och de m\u00e4nniskor som ligger bakom det. Vi m\u00e5ste vara medvetna om de tekniker de anv\u00e4nder f\u00f6r att attackera oss. Och vi m\u00e5ste f\u00f6rst\u00e5 de s\u00e5rbarheter som de utnyttjar.<\/p>\n\n\n\n<h2><strong>\u00c4ndra v\u00e5rt tankes\u00e4tt<\/strong><\/h2>\n\n\n\n<p>Det andra steget \u00e4r att f\u00f6r\u00e4ndra v\u00e5ra tankes\u00e4tt. Vi m\u00e5ste t\u00e4nka p\u00e5 s\u00e4kerhet som en process, inte en produkt, och integrera den i allt vi g\u00f6r. Med andra ord m\u00e5ste vi vara proaktiva, inte reaktiva. Och vi m\u00e5ste arbeta tillsammans f\u00f6r att g\u00f6ra v\u00e5r v\u00e4rld till en s\u00e4krare plats.<\/p>\n\n\n\n<h2><strong>Vidta \u00e5tg\u00e4rder<\/strong><\/h2>\n\n\n\n<p>Det tredje steget \u00e4r att vidta \u00e5tg\u00e4rder. Vi m\u00e5ste genomf\u00f6ra de f\u00f6r\u00e4ndringar vi har talat om och investera i cybers\u00e4kerhet f\u00f6r att se till att vi kan reagera p\u00e5 cyberhot snabbt och effektivt.<\/p>\n\n\n\n<h2><strong>Slutresultatet<\/strong><\/h2>\n\n\n\n<p>Cybers\u00e4kerhet \u00e4r viktigt eftersom vi befinner oss i krig. V\u00e5r fiende \u00e4r smidig och snabbr\u00f6rlig, och de anv\u00e4nder teknik f\u00f6r att genomf\u00f6ra attacker i en omfattning som vi aldrig tidigare har sett. Vi m\u00e5ste \u00e4ndra v\u00e5rt tankes\u00e4tt och v\u00e5r inst\u00e4llning till s\u00e4kerhet. Och vi m\u00e5ste arbeta tillsammans f\u00f6r att g\u00f6ra v\u00e5r v\u00e4rld till en s\u00e4krare plats.<\/p>\n\n\n\n<p>&nbsp;<\/p>","protected":false},"excerpt":{"rendered":"<p>Genom historien har de som deltar i konflikter alltid anv\u00e4nt den senaste tekniken f\u00f6r att fr\u00e4mja sin sak och uppn\u00e5 specifika m\u00e5l. I varje krig har genombrott utnyttjats f\u00f6r att bek\u00e4mpa... <a class=\"more-link\" href=\"https:\/\/securitybriefing.net\/sv\/cybersakerhet\/vikten-av-cybersakerhet\/\">Continue reading <span class=\"screen-reader-text\">Vikten av cybers\u00e4kerhet<\/span><\/a><\/p>","protected":false},"author":1,"featured_media":998,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[15],"tags":[],"class_list":["post-709","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","entry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>The importance of cyber security | Security Briefing<\/title>\n<meta name=\"description\" content=\"Cybersecurity is more important than ever. Learn why you need to take your online security seriously and how to keep yourself safe.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/securitybriefing.net\/sv\/cybersakerhet\/vikten-av-cybersakerhet\/\" \/>\n<meta property=\"og:locale\" content=\"sv_SE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The importance of cyber security | Security Briefing\" \/>\n<meta property=\"og:description\" content=\"Cybersecurity is more important than ever. Learn why you need to take your online security seriously and how to keep yourself safe.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/securitybriefing.net\/sv\/cybersakerhet\/vikten-av-cybersakerhet\/\" \/>\n<meta property=\"og:site_name\" content=\"Security Briefing\" \/>\n<meta property=\"article:published_time\" content=\"2022-10-05T20:20:36+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/10\/The-importance-of-cyber-security-2-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"558\" \/>\n\t<meta property=\"og:image:height\" content=\"500\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"security\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Skriven av\" \/>\n\t<meta name=\"twitter:data1\" content=\"security\" \/>\n\t<meta name=\"twitter:label2\" content=\"Ber\u00e4knad l\u00e4stid\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minuter\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/the-importance-of-cyber-security\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/the-importance-of-cyber-security\/\"},\"author\":{\"name\":\"security\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81\"},\"headline\":\"The importance of cyber security\",\"datePublished\":\"2022-10-05T20:20:36+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/the-importance-of-cyber-security\/\"},\"wordCount\":1046,\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/the-importance-of-cyber-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/10\/The-importance-of-cyber-security-2-1.jpg\",\"articleSection\":[\"cybersecurity\"],\"inLanguage\":\"sv-SE\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/the-importance-of-cyber-security\/\",\"url\":\"https:\/\/securitybriefing.net\/cybersecurity\/the-importance-of-cyber-security\/\",\"name\":\"The importance of cyber security | Security Briefing\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/the-importance-of-cyber-security\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/the-importance-of-cyber-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/10\/The-importance-of-cyber-security-2-1.jpg\",\"datePublished\":\"2022-10-05T20:20:36+00:00\",\"description\":\"Cybersecurity is more important than ever. Learn why you need to take your online security seriously and how to keep yourself safe.\",\"breadcrumb\":{\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/the-importance-of-cyber-security\/#breadcrumb\"},\"inLanguage\":\"sv-SE\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/securitybriefing.net\/cybersecurity\/the-importance-of-cyber-security\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"sv-SE\",\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/the-importance-of-cyber-security\/#primaryimage\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/10\/The-importance-of-cyber-security-2-1.jpg\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/10\/The-importance-of-cyber-security-2-1.jpg\",\"width\":558,\"height\":500,\"caption\":\"The importance of cyber security\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/the-importance-of-cyber-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/securitybriefing.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The importance of cyber security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/securitybriefing.net\/#website\",\"url\":\"https:\/\/securitybriefing.net\/\",\"name\":\"Security Briefing\",\"description\":\"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.\",\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/securitybriefing.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"sv-SE\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/securitybriefing.net\/#organization\",\"name\":\"Security Briefing\",\"url\":\"https:\/\/securitybriefing.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"sv-SE\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"width\":256,\"height\":70,\"caption\":\"Security Briefing\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81\",\"name\":\"security\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"sv-SE\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g\",\"caption\":\"security\"},\"description\":\"admin is a senior staff writer for Government Technology. She previously wrote for PYMNTS and The Bay State Banner, and holds a B.A. in creative writing from Carnegie Mellon. She\u2019s based outside Boston.\",\"sameAs\":[\"http:\/\/securitybriefing.net\"],\"url\":\"https:\/\/securitybriefing.net\/sv\/author\/security\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Betydelsen av cybers\u00e4kerhet | S\u00e4kerhetsgenomg\u00e5ng","description":"Cybers\u00e4kerhet \u00e4r viktigare \u00e4n n\u00e5gonsin. L\u00e4r dig varf\u00f6r du m\u00e5ste ta din onlines\u00e4kerhet p\u00e5 allvar och hur du skyddar dig.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/securitybriefing.net\/sv\/cybersakerhet\/vikten-av-cybersakerhet\/","og_locale":"sv_SE","og_type":"article","og_title":"The importance of cyber security | Security Briefing","og_description":"Cybersecurity is more important than ever. Learn why you need to take your online security seriously and how to keep yourself safe.","og_url":"https:\/\/securitybriefing.net\/sv\/cybersakerhet\/vikten-av-cybersakerhet\/","og_site_name":"Security Briefing","article_published_time":"2022-10-05T20:20:36+00:00","og_image":[{"width":558,"height":500,"url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/10\/The-importance-of-cyber-security-2-1.jpg","type":"image\/jpeg"}],"author":"security","twitter_card":"summary_large_image","twitter_misc":{"Skriven av":"security","Ber\u00e4knad l\u00e4stid":"5 minuter"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/securitybriefing.net\/cybersecurity\/the-importance-of-cyber-security\/#article","isPartOf":{"@id":"https:\/\/securitybriefing.net\/cybersecurity\/the-importance-of-cyber-security\/"},"author":{"name":"security","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81"},"headline":"The importance of cyber security","datePublished":"2022-10-05T20:20:36+00:00","mainEntityOfPage":{"@id":"https:\/\/securitybriefing.net\/cybersecurity\/the-importance-of-cyber-security\/"},"wordCount":1046,"publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"image":{"@id":"https:\/\/securitybriefing.net\/cybersecurity\/the-importance-of-cyber-security\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/10\/The-importance-of-cyber-security-2-1.jpg","articleSection":["cybersecurity"],"inLanguage":"sv-SE"},{"@type":"WebPage","@id":"https:\/\/securitybriefing.net\/cybersecurity\/the-importance-of-cyber-security\/","url":"https:\/\/securitybriefing.net\/cybersecurity\/the-importance-of-cyber-security\/","name":"Betydelsen av cybers\u00e4kerhet | S\u00e4kerhetsgenomg\u00e5ng","isPartOf":{"@id":"https:\/\/securitybriefing.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/securitybriefing.net\/cybersecurity\/the-importance-of-cyber-security\/#primaryimage"},"image":{"@id":"https:\/\/securitybriefing.net\/cybersecurity\/the-importance-of-cyber-security\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/10\/The-importance-of-cyber-security-2-1.jpg","datePublished":"2022-10-05T20:20:36+00:00","description":"Cybers\u00e4kerhet \u00e4r viktigare \u00e4n n\u00e5gonsin. L\u00e4r dig varf\u00f6r du m\u00e5ste ta din onlines\u00e4kerhet p\u00e5 allvar och hur du skyddar dig.","breadcrumb":{"@id":"https:\/\/securitybriefing.net\/cybersecurity\/the-importance-of-cyber-security\/#breadcrumb"},"inLanguage":"sv-SE","potentialAction":[{"@type":"ReadAction","target":["https:\/\/securitybriefing.net\/cybersecurity\/the-importance-of-cyber-security\/"]}]},{"@type":"ImageObject","inLanguage":"sv-SE","@id":"https:\/\/securitybriefing.net\/cybersecurity\/the-importance-of-cyber-security\/#primaryimage","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/10\/The-importance-of-cyber-security-2-1.jpg","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/10\/The-importance-of-cyber-security-2-1.jpg","width":558,"height":500,"caption":"The importance of cyber security"},{"@type":"BreadcrumbList","@id":"https:\/\/securitybriefing.net\/cybersecurity\/the-importance-of-cyber-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/securitybriefing.net\/"},{"@type":"ListItem","position":2,"name":"The importance of cyber security"}]},{"@type":"WebSite","@id":"https:\/\/securitybriefing.net\/#website","url":"https:\/\/securitybriefing.net\/","name":"S\u00e4kerhetsgenomg\u00e5ng","description":"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.","publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/securitybriefing.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"sv-SE"},{"@type":"Organization","@id":"https:\/\/securitybriefing.net\/#organization","name":"S\u00e4kerhetsgenomg\u00e5ng","url":"https:\/\/securitybriefing.net\/","logo":{"@type":"ImageObject","inLanguage":"sv-SE","@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","width":256,"height":70,"caption":"Security Briefing"},"image":{"@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81","name":"s\u00e4kerhet","image":{"@type":"ImageObject","inLanguage":"sv-SE","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g","caption":"security"},"description":"admin \u00e4r en senior personalf\u00f6rfattare f\u00f6r Government Technology. Hon skrev tidigare f\u00f6r PYMNTS och The Bay State Banner och har en BA i kreativt skrivande fr\u00e5n Carnegie Mellon. Hon \u00e4r baserad utanf\u00f6r Boston.","sameAs":["http:\/\/securitybriefing.net"],"url":"https:\/\/securitybriefing.net\/sv\/author\/security\/"}]}},"_links":{"self":[{"href":"https:\/\/securitybriefing.net\/sv\/wp-json\/wp\/v2\/posts\/709","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/securitybriefing.net\/sv\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/securitybriefing.net\/sv\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/sv\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/sv\/wp-json\/wp\/v2\/comments?post=709"}],"version-history":[{"count":0,"href":"https:\/\/securitybriefing.net\/sv\/wp-json\/wp\/v2\/posts\/709\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/sv\/wp-json\/wp\/v2\/media\/998"}],"wp:attachment":[{"href":"https:\/\/securitybriefing.net\/sv\/wp-json\/wp\/v2\/media?parent=709"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/securitybriefing.net\/sv\/wp-json\/wp\/v2\/categories?post=709"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/securitybriefing.net\/sv\/wp-json\/wp\/v2\/tags?post=709"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}